The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ions(1385hit)

701-720hit(1385hit)

  • Construction of Classifiers by Iterative Compositions of Features with Partial Knowledge

    Kazuya HARAGUCHI  Toshihide IBARAKI  

     
    PAPER

      Vol:
    E89-A No:5
      Page(s):
    1284-1291

    We consider the classification problem to construct a classifier c:{0,1}n{0,1} from a given set of examples (training set), which (approximately) realizes the hidden oracle y:{0,1}n{0,1} describing the phenomenon under consideration. For this problem, a number of approaches are already known in computational learning theory; e.g., decision trees, support vector machines (SVM), and iteratively composed features (ICF). The last one, ICF, was proposed in our previous work (Haraguchi et al., (2004)). A feature, composed of a nonempty subset S of other features (including the original data attributes), is a Boolean function fS:{0,1}S{0,1} and is constructed according to the proposed rule. The ICF algorithm iterates generation and selection processes of features, and finally adopts one of the generated features as the classifier, where the generation process may be considered as embodying the idea of boosting, since new features are generated from the available features. In this paper, we generalize a feature to an extended Boolean function fS:{0,1,*}S{0,1,*} to allow partial knowledge, where * denotes the state of uncertainty. We then propose the algorithm ICF* to generate such generalized features. The selection process of ICF* is also different from that of ICF, in that features are selected so as to cover the entire training set. Our computational experiments indicate that ICF* is better than ICF in terms of both classification performance and computation time. Also, it is competitive with other representative learning algorithms such as decision trees and SVM.

  • Robust Blind Equalization Algorithms Based on the Constrained Maximization of a Fourth-Order Cumulant Function

    Kiyotaka KOHNO  Mitsuru KAWAMOTO  Asoke K. NANDI  Yujiro INOUYE  

     
    LETTER-Digital Signal Processing

      Vol:
    E89-A No:5
      Page(s):
    1495-1499

    The present letter deals with the blind equalization problem of a single-input single-output infinite impulse response (SISO-IIR) channel with additive Gaussian noise. To solve the problem, we propose a new criterion for maximizing constrainedly a fourth-order cumulant. The algorithms derived from the criterion have such a novel property that even if Gaussian noise is added to the output of the channel, an effective zero-forcing (ZF) equalizer can be obtained with as little influence of Gaussian noise as possible. To show the validity of the proposed criterion, some simulation results are presented.

  • Investigation of Class E Amplifier with Nonlinear Capacitance for Any Output Q and Finite DC-Feed Inductance

    Hiroo SEKIYA  Yoji ARIFUKU  Hiroyuki HASE  Jianming LU  Takashi YAHAGI  

     
    PAPER

      Vol:
    E89-A No:4
      Page(s):
    873-881

    This paper investigates the design curves of class E amplifier with nonlinear capacitance for any output Q and finite dc-feed inductance. The important results are; 1) the capacitance nonlinearity strongly affects the design parameters for low Q, 2) the value of dc-feed inductance is hardly affected by the capacitance nonlinearity, and 3) the input voltage is an important parameter to design class E amplifier with nonlinear capacitance. By carrying out PSpice simulations, we show that the simulated results agree with the desired ones quantitatively. It is expected that the design curves in this paper are useful guidelines for the design of class E amplifier with nonlinear capacitance.

  • Performance Analysis of Coherent Ultrashort Light Pulse CDMA Communication Systems with Nonlinear Optical Thresholder

    Yasutaka IGARASHI  Hiroyuki YASHIMA  

     
    PAPER-Fiber-Optic Transmission for Communications

      Vol:
    E89-B No:4
      Page(s):
    1205-1213

    We theoretically analyze the performance of coherent ultrashort light pulse code-division multiple-access (CDMA) communication systems with a nonlinear optical thresholder. The coherent ultrashort light pulse CDMA is a promising system for an optical local area network (LAN) due to its advantages of asynchronous transmission, high information security, multiple access capability, and optical processing. The nonlinear optical thresholder is based on frequency chirping induced by self-phase modulation (SPM) in optical fiber, and discriminates an ultrashort pulse from multiple access interference (MAI) with picosecond duration. The numerical results show that the thermal noise caused in a photodetector dominates the bit error rate (BER). BER decreases as the fiber length in the nonlinear thresholder and the photocurrent difference in the photodetector increase. Using the nonlinear optical thresholder allows for the response time of the photodetector to be at least 100 times the duration of the ultrashort pulses. We also show that the optimum cut-off frequency at the nonlinear thresholder to achieve the minimum BER increases with fiber length, the total number of users, and the load resistance in the photodetector.

  • Circularly Polarized Rounded-Off Triangular Microstrip Line Array Antenna

    David DELAUNE  Josaphat Tetuko SRI SUMANTYO  Masaharu TAKAHASHI  Koichi ITO  

     
    PAPER-Antennas and Propagation

      Vol:
    E89-B No:4
      Page(s):
    1372-1381

    The Japan Aerospace Exploration Agency (JAXA) plans to launch a geostationary satellite called Engineering Test Satellite VIII (ETS-VIII) in FY 2006. In this paper, a microstrip line array antenna, which has a very simple structure, is introduced to radiate a circularly polarized wave aiming at ETS-VIII applications. This antenna consists of a triangular conducting line with its vertexes rounded off, located above a ground plane, with a gap on one of its side to produce a circular polarization. The proposed antenna is analyzed by numerical simulations for a single element as well as for a three elements array configuration and the possibility of beam-switching in the azimuth space is experimentally confirmed in the latter case. It is found that by properly feeding the elements constituting the array antenna, for an elevation angle El = 48in Tokyo area, three beams are created in the conical-cut direction with a minimum gain more than 6.6 dBic and an axial ratio less than 3 dB.

  • An Active Noise Control System Based on Simultaneous Equations Method without Auxiliary Filters

    Mitsuji MUNEYASU  Osamu HISAYASU  Kensaku FUJII  Takao HINAMOTO  

     
    PAPER

      Vol:
    E89-A No:4
      Page(s):
    960-968

    A simultaneous equations method is one of active noise control algorithms without estimating an error path. This algorithm requires identification of a transfer function from a reference microphone to an error microphone containing the effect of a noise control filter. It is achieved by system identification of an auxiliary filter. However, the introduction of the auxiliary filter requires more number of samples to obtain the noise control filter and brings a requirement of some undesirable assumption in the multiple channel case. In this paper, a new simultaneous equations method without the identification of the auxiliary filter is proposed. By storing a small number of input signals and error signals, we avoid this identification. Therefore, we can reduce the number of samples to obtain the noise control filters and can avoid the undesirable assumption. From simulation examples, it is verified that the merits of the ordinary method is also retained in the proposed method.

  • Sizing Data-Intensive Systems from ER Model

    Hee Beng Kuan TAN  Yuan ZHAO  

     
    PAPER

      Vol:
    E89-D No:4
      Page(s):
    1321-1326

    There is still much problem in sizing software despite the existence of well-known software sizing methods such as Function Point method. Many developers still continue to use ad-hoc methods or so called "expert" approaches. This is mainly due to the fact that the existing methods require much information that is difficult to identify or estimate in the early stage of a software project. The accuracy of ad-hoc and "expert" methods also has much problem. The entity-relationship (ER) model is widely used in conceptual modeling (requirements analysis) for data-intensive systems. The characteristic of a data-intensive system, and therefore the source code of its software, is actually well characterized by the ER diagram that models its data. This paper proposes a method for building software size model from extended ER diagram through the use of regression models. We have collected some real data from the industry to do a preliminary validation of the proposed method. The result of the validation is very encouraging.

  • Analysis of Reactance Oscillators Having Multi-Mode Oscillations

    Yoshihiro YAMAGAMI  Yoshifumi NISHIO  Akio USHIDA  

     
    PAPER-Circuit Theory

      Vol:
    E89-A No:3
      Page(s):
    764-771

    We consider oscillators consisting of a reactance circuit and a negative resistor. They may happen to have multi-mode oscillations around the anti-resonant frequencies of the reactance circuit. This kind of oscillators can be easily synthesized by setting the resonant and anti-resonant frequencies of the reactance circuits. However, it is not easy to analyze the oscillation phenomena, because they have multiple oscillations whose oscillations depend on the initial guesses. In this paper, we propose a Spice-oriented solution algorithm combining the harmonic balance method with Newton homotopy method that can find out the multiple solutions on the homotopy paths. In our analysis, the determining equations from the harmonic balance method are given by modified equivalent circuit models of "DC," "Cosine" and "Sine" circuits. The modified circuits can be solved by a simulator STC (solution curve tracing circuit), where the multiple oscillations are found by the transient analysis of Spice. Thus, we need not to derive the troublesome circuit equations, nor the mathematical transformations to get the determining equations. It makes the solution algorithms much simpler.

  • Visible Light Communication with LED Traffic Lights Using 2-Dimensional Image Sensor

    Haswani BINTI CHE WOOK  Shinichiro HARUYAMA  Masao NAKAGAWA  

     
    PAPER-Communications

      Vol:
    E89-A No:3
      Page(s):
    654-659

    We propose a new receiving method for an information-providing system that uses LED-based traffic lights as the transmitter. We analyzed the improvements obtained when 2-dimentional image sensor replaced the conventional single-element photodiode. First, we discuss the maximum receiver's field of view (FOV) when using the 2-dimentional image sensor at a particular focal length. We analyzed the best vertical inclination for both lanes and quantified the improvements in terms of the enhancement of received signal-noise ratio (SNR) when different numbers of pixels were applied. Our results indicate that using more pixels increases the received SNR and the service area becomes wider compared to the conventional single-element system. Consequently, receivable information within the service area also increased. We also found that the optimum number of pixels to accomplish a reliable communication system is 5050 because performance degradation occured with a larger number of pixels.

  • Depth Perception from a 2D Natural Scene Using Scale Variation of Texture Patterns

    Yousun KANG  Hiroshi NAGAHASHI  

     
    LETTER-Pattern Recognition

      Vol:
    E89-D No:3
      Page(s):
    1294-1298

    In this paper, we introduce a new method for depth perception from a 2D natural scene using scale variation of patterns. As the surface from a 2D scene gets farther away from us, the texture appears finer and smoother. Texture gradient is one of the monocular depth cues which can be represented by gradual scale variations of textured patterns. To extract feature vectors from textured patterns, higher order local autocorrelation functions are utilized at each scale step. The hierarchical linear discriminant analysis is employed to classify the scale rate of the feature vector which can be divided into subspaces by recursively grouping the overlapped classes. In the experiment, relative depth perception of 2D natural scenes is performed on the proposed method and it is expected to play an important role in natural scene analysis.

  • Evaluating IPv6 Application Transition

    Myung-Ki SHIN  

     
    LETTER-Internet

      Vol:
    E89-B No:3
      Page(s):
    982-984

    Even though various kinds of IPv6 transition mechanisms have been developed for the transition to an IPv6 network, these transition mechanisms take no stance on whether applications support IPv6 or not. This paper describes why the transition period between IPv4 and IPv6 applications may not be straightforward and applications should be ported to support both IPv4 and IPv6; such applications are called "IP version-independent applications." Also, this paper examines and empirically evaluates overhead of the IP version-independent applications, since the performance implication is not well known. The overhead might be very dependent on data sizes and network performance, but it was relatively minimized for general Internet traffic with larger data sizes and lower network latency.

  • System LSI: Challenges and Opportunities

    Tadahiro KURODA  

     
    INVITED PAPER

      Vol:
    E89-C No:3
      Page(s):
    213-220

    Scaling of CMOS Integrated Circuit is becoming difficult, due mainly to rapid increase in power dissipation. How will the semiconductor technology and industry develop? This paper discusses challenges and opportunities in system LSI from three levels of perspectives: transistor level (physics), IC level (electronics), and business level (economics).

  • A Speech Packet Loss Concealment Method Using Linear Prediction

    Kazuhiro KONDO  Kiyoshi NAKAGAWA  

     
    PAPER-Speech and Hearing

      Vol:
    E89-D No:2
      Page(s):
    806-813

    We proposed and evaluated a speech packet loss concealment method which predicts lost segments from speech included in packets either before, or both before and after the lost packet. The lost segments are predicted recursively by using linear prediction both in the forward direction from the packet preceding the loss, and in the backward direction from the packet succeeding the lost segment. Predicted samples in each direction are smoothed by averaging using linear weights to obtain the final interpolated signal. The adjacent segments are also smoothed extensively to significantly reduce the speech quality discontinuity between the interpolated signal and the received speech signal. Subjective quality comparisons between the proposed method and the the packet loss concealment algorithm described in the ITU standard G.711 Appendix I showed similar scores up to about 10% packet loss. However, the proposed method showed higher scores above this loss rate, with Mean Opinion Score rating exceeding 2.4, even at an extremely high packet loss rate of 30%. Packet loss concealment of speech degraded with G.729 coding, and babble noise mixed speech showed similar trends, with the proposed method showing higher qualities at high loss rates. We plan to further improve the performance by using adaptive LPC prediction order depending on the estimated pitch, and adaptive LPC bandwidth expansion depending on the consecutive number of repetitive prediction, among many other improvements. We also plan to investigate complexity reduction using gradient LPC coefficient updates, and processing delay reduction using adaptive forward/bidirectional prediction modes depending on the measured packet loss ratio.

  • Seamless Symbol Rate Switching Scheme for Multi-Rate FDMA Modem

    Fumihiro YAMASHITA  Kiyoshi KOBAYASHI  Kohei OHATA  Masazumi UEBA  

     
    PAPER-Satellite Communication

      Vol:
    E89-B No:2
      Page(s):
    545-555

    A new seamless symbol rate switchable modem for multi-rate FDMA systems is proposed in this paper. In the new modem, a novel clock phase compensation algorithm makes it possible to switch the symbol rate synchronously between the transmitter and the receiver, with no degradation in BER when the symbol rate is changed. In addition, by matching the interpolation filter to the symbol rate, this modem is capable of operating at lower clock speeds, which greatly reduces the consumption power. Computer simulations confirm its fundamental performance. Simulation results show that the proposed power-efficient symbol rate switchable modem can change the symbol rate without degrading BER performance.

  • A Security Middleware Model for Real-Time Applications on Grids

    Tao XIE  Xiao QIN  

     
    PAPER-Grid Computing

      Vol:
    E89-D No:2
      Page(s):
    631-638

    Real-time applications are indispensable for conducting research and business in government, industry, and academic organizations. Recently, real-time applications with security requirements increasingly emerged in large-scale distributed systems such as Grids. However, the complexities and specialties of diverse security mechanisms dissuade users from employing existing security services for their applications. To effectively tackle this problem, in this paper we propose a security middleware (SMW) model from which security-sensitive real-time applications are enabled to exploit a variety of security services to enhance the trustworthy executions of the applications. A quality of security control manager (QSCM), a centerpiece of the SMW model, has been designed and implemented to achieve a flexible trade-off between overheads caused by security services and system performance, especially under situations where available resources are dynamically changing and insufficient. A security-aware scheduling mechanism, which plays an important role in QSCM, is capable of maximizing quality of security for real-time applications running in distributed systems as large-scale as Grids. Our empirical studies based on real world traces from a supercomputing center demonstratively show that the proposed model can significantly improve the performance of Grids in terms of both security and schedulability.

  • Least-Squares Linear Smoothers from Randomly Delayed Observations with Correlation in the Delay

    Seiichi NAKAMORI  Aurora HERMOSO-CARAZO  Josefa LINARES-PEREZ  

     
    PAPER-Digital Signal Processing

      Vol:
    E89-A No:2
      Page(s):
    486-493

    This paper discusses the least-squares linear filtering and smoothing (fixed-point and fixed-interval) problems of discrete-time signals from observations, perturbed by additive white noise, which can be randomly delayed by one sampling time. It is assumed that the Bernoulli random variables characterizing delay measurements are correlated in consecutive time instants. The marginal distribution of each of these variables, specified by the probability of a delay in the measurement, as well as their correlation function, are known. Using an innovation approach, the filtering, fixed-point and fixed-interval smoothing recursive algorithms are obtained without requiring the state-space model generating the signal; they use only the covariance functions of the signal and the noise, the delay probabilities and the correlation function of the Bernoulli variables. The algorithms are applied to a particular transmission model with stand-by sensors for the immediate replacement of a failed unit.

  • Audio Narrowcasting and Privacy for Multipresent Avatars on Workstations and Mobile Phones

    Owen Noel Newton FERNANDO  Kazuya ADACHI  Uresh DUMINDUWARDENA  Makoto KAWAGUCHI  Michael COHEN  

     
    PAPER

      Vol:
    E89-D No:1
      Page(s):
    73-87

    Our group is exploring interactive multi- and hypermedia, especially applied to virtual and mixed reality multimodal groupware systems. We are researching user interfaces to control source→sink transmissions in synchronous groupware (like teleconferences, chatspaces, virtual concerts, etc.). We have developed two interfaces for privacy visualization of narrowcasting (selection) functions in collaborative virtual environments (CVES): for a workstation WIMP (windows/icon/menu/pointer) GUI (graphical user interface), and for networked mobile devices, 2.5- and 3rd-generation mobile phones. The interfaces are integrated with other CVE clients, interoperating with a heterogeneous multimodal groupware suite, including stereographic panoramic browsers and spatial audio backends & speaker arrays. The narrowcasting operations comprise an idiom for selective attention, presence, and privacy-- an infrastructure for rich conferencing capability.

  • Limiting the Holding Time Considering Emergency Calls in Mobile Cellular Phone Systems during Disasters

    Kazunori OKADA  

     
    PAPER-Network

      Vol:
    E89-B No:1
      Page(s):
    57-65

    During devastating natural disasters, numerous people want to make calls to check on their families and friends in the stricken areas, but many call attempts on mobile cellular systems are blocked due to limited radio frequency resources. To reduce call blocking and enable as many people as possible to access mobile cellular systems, placing a limit on the holding time for each call has been studied [1],[2]. However, during a catastrophe, emergency calls, e.g., calls to fire, ambulance, or police services are also highly likely to increase and it is important that the holding time for these calls is not limited. A method of limiting call holding time to make provision for emergency calls while considering the needs of ordinary callers is proposed. In this method, called the HTL-E method, all calls are classified as emergency calls or other according to the numbers that are dialed or the terminal numbers that are given in advance to the particular terminals making emergency calls, and only the holding time of other calls is limited. The performance characteristics of the HTL-E method were evaluated using computer simulations. The results showed that it reduced the rates of blocking and forced call termination at handover considerably, without reducing the holding time for emergency calls. The blocking rate was almost equal for emergency and other calls. In addition, the HTL-E method handles fluctuations in the demand for emergency calls flexibly. A simple method of estimating the holding-time limit for other calls, which reduces the blocking rate for emergency and other calls to the normal rate for periods of increased call demand is also presented. The calculated results produced by this method agreed well with the simulation results.

  • Quadratic Equations from APN Power Functions

    Jung Hee CHEON  Dong Hoon LEE  

     
    PAPER-Symmetric Key Cryptography

      Vol:
    E89-A No:1
      Page(s):
    19-27

    We develop several tools to derive quadratic equations from algebraic S-boxes and to prove their linear independence. By applying them to all known almost perfect nonlinear (APN) power functions and the inverse function, we can estimate the resistance against algebraic attacks. As a result, we can show that APN functions have different resistance against algebraic attacks, and especially S-boxes with Gold or Kasami exponents have very weak resistance.

  • A Selective Video Encryption Scheme for MPEG Compression Standard

    Gang LIU  Takeshi IKENAGA  Satoshi GOTO  Takaaki BABA  

     
    PAPER-Application

      Vol:
    E89-A No:1
      Page(s):
    194-202

    With the increase of commercial multimedia applications using digital video, the security of video data becomes more and more important. Although several techniques have been proposed in order to protect these video data, they provide limited security or introduce significant overhead. This paper proposes a video security scheme for MPEG video compression standard, which includes two methods: DCEA (DC Coefficient Encryption Algorithm) and "Event Shuffle." DCEA is aim to encrypt group of codewords of DC coefficients. The feature of this method is the usage of data permutation to scatter the ciphertexts of additional codes in DC codewords. These additional codes are encrypted by block cipher previously. With the combination of these algorithms, the method provides enough security for important DC component of MPEG video data. "Event Shuffle" is aim to encrypt the AC coefficients. The prominent feature of this method is a shuffling of AC events generated after DCT transformation and quantization stages. Experimental results show that these methods introduce no bit overhead to MPEG bit stream while achieving low processing overhead to MPEG codec.

701-720hit(1385hit)